Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies
نویسندگان
چکیده
Honeypots are network surveillance architectures designed to resemble easy-to-compromise computer systems. They are deployed with the aim to trap hackers in order to help security professionals capture, control, and analyze malicious Internet attacks and other activities of hackers. A botnet is an army of compromised computers controlled by a bot herder and used for illicit financial gain. Botnets have become quite popular in recent Internet attacks. Since honeypots have been deployed in many defense systems, attackers constructing and maintaining botnets are forced to find ways to avoid honeypot traps. In fact, some researchers have even suggested equipping normal machines by misleading evidence so that they appear as honeypots in order to scare away rational attackers. In this paper, we address some aspects related to the problem of honeypot detection by botmasters. In particular, we show that current honeypot architectures and operation limitations may allow attackers to systematically collect, combine and analyze evidence about the true nature of the machines they compromise. In particular, we show how a systematic technique for evidence combining such as Dempster-Shafer theory can allow botmasters to determine the true nature of compromised machines with a relatively high certainty. The obtained results demonstrate inherent limitations of current honeypot designs. We also aim to draw the attention of security professionals to work on enhancing the discussed features of honeypots in order to prevent them from being abused by botmasters.
منابع مشابه
A Sensor-Based Scheme for Activity Recognition in Smart Homes using Dempster-Shafer Theory of Evidence
This paper proposes a scheme for activity recognition in sensor based smart homes using Dempster-Shafer theory of evidence. In this work, opinion owners and their belief masses are constructed from sensors and employed in a single-layered inference architecture. The belief masses are calculated using beta probability distribution function. The frames of opinion owners are derived automatically ...
متن کاملA case of combination of evidence in the Dempster-Shafer theory inconsistent with evaluation of probabilities
The Dempster-Shafer theory of evidence accumulation is one of the main tools for combining data obtained from multiple sources. In this paper a special case of combination of two bodies of evidence with non-zero conflict coefficient is considered. It is shown that application of the Dempster-Shafer rule of combination in this case leads to an evaluation of masses of the combined bodies that is ...
متن کاملAbout Relation between the Measure of Conflict and Decreasing of Ignorance in Theory of Evidence
There is a problem of applying of combining rules to evidence which were got from different information sources in framework of Dempster-Shafer theory. In this work the conflict measure and index of decreasing of ignorance in frame of Dempster-Shafer theory are introduced for characterization of quality of applied combining rules. Those functionals are analyzed on the bodies of evidences of spe...
متن کاملRanking the factors affecting the care and provision of health services to patients in medical centers using the VIKOR dempster-shafer method: a brief report
Background: Determining the rank of important parameters in ranking health care and providing health services to patients in medical centers. Methods: The research method is descriptive-analytical and applied in terms of classification. The data is from the database of the Faculty of Health and Medicine of the University of Tehran, which was collected as an archive from April 1998 to May 1999....
متن کاملA Study on Properties of Dempster-Shafer Theory to Probability Theory transformations
In this paper, five conditions that have been proposed by Cobb and Shenoy are studied for nine different mappings from the Dempster-Shafer theory to the probability theory. After comparing these mappings, one of the considerable results indicates that none of the mappings satisfies the condition of invariance with respect to the marginalization process. In more details, the main reason for this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Security Journal: A Global Perspective
دوره 21 شماره
صفحات -
تاریخ انتشار 2012